Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

  title={Automated Insider Threat Detection System Using User and Role-Based Profile Assessment},
  author={Philip A. Legg and Oliver Buckley and Michael Goldsmith and Sadie Creese},
  journal={IEEE Systems Journal},
Organizations are experiencing an ever-growing concern of how to identify and defend against insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. This could range from financial theft and intellectual property theft to the destruction of property and business reputation. Traditional intrusion detection systems are neither designed nor capable of… CONTINUE READING
Highly Cited
This paper has 25 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 19 extracted citations

A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) • 2018
View 3 Excerpts
Highly Influenced

Activity Pattern Discovery from Network Captures

2016 IEEE Security and Privacy Workshops (SPW) • 2016
View 3 Excerpts
Highly Influenced

Adaptive One-Class Ensemble-based Anomaly Detection: An Application to Insider Threats

2018 International Joint Conference on Neural Networks (IJCNN) • 2018
View 1 Excerpt

Towards a User and Role-Based Behavior Analysis Method for Insider Threat Detection

2018 International Conference on Network Infrastructure and Digital Content (IC-NIDC) • 2018
View 3 Excerpts

Data theft prevention using user behavior profiling and decoy documents

2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon) • 2017
View 1 Excerpt

Insider Threat Detection Based on Deep Belief Network Feature Representation

2017 International Conference on Green Informatics (ICGI) • 2017
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 24 references

The psychological meaning of words: LIWC and computerized text analysis methods

Y. R. Tausczik, J. W. Pennebaker
J. Lang. Social Psychol., vol. 29, no. 1, pp. 24–54, Mar. 2010. • 2010
View 5 Excerpts
Highly Influenced

Unsupervised incremental sequence learning for insider threat detection

2012 IEEE International Conference on Intelligence and Security Informatics • 2012
View 3 Excerpts
Highly Influenced

Insider threat detection by process analysis

M. Bishop
Proc. IEEE SPW, 2014, pp. 251–264. • 2014

Invalidating Policies using Structural Information

2013 IEEE Security and Privacy Workshops • 2013
View 2 Excerpts

Linguistic protocols for secure information management and sharing

Computers & Mathematics with Applications • 2012
View 2 Excerpts

Similar Papers

Loading similar papers…